Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Document1 Topic Weight Excellent Very Good Good Satisfactory Unsatisfactory No Attempt Comprehension 25% Demonstrated a sophisticated understanding of the topic and relevant concepts. Demonstrated an...

1 answer below »
Document1
Topic Weight Excellent Very Good Good Satisfactory Unsatisfactory No Attempt
Comprehension 25%
Demonstrated a
sophisticated
understanding of the
topic and relevant
concepts.
Demonstrated an
advanced
understanding of the
topic and relevant
concepts.
Demonstrated a clear
understanding of the
topic and relevant
concepts.
Demonstrated sum
understanding of the
topic and relevant
concepts.
Demonstrated a
limited
understanding of the
topic and relevant
concepts.
Demonstrates no
understanding of the
topic or relevant
concepts.
Argument 25%
Expresses a logical
and highly persuasive
argument supported
y appropriate
literature. Argument
utilises and
integrates an
extensive number of
sources.
Expresses a logical
and persuasive
argument supported
y appropriate
literature. Argument
utilises and
integrates a large
number of sources.
Expresses an
effective argument
supported by
appropriate
literature. Argument
utilises and
integrates an
appropriate number
of sources.
Expresses an
argument supported
y appropriate
literature. Argument
utilises and
integrates a limited
number of sources.
Describes the
content of the article
without critique. May
make some reference
to other sources.
Limited attempt to
describe an article
and/or makes no
eference to other
sources.
Structure 20%
Logical and cohesive
structure. Elegant
progression between
the substantive
points made. There
are highly effective
links within and
across paragraphs.
Logical and coherent
structure. Effective
progression between
the substantive
points made. There
are clear links within
and across
paragraphs.
Coherent structure.
Points are generally
organised into
paragraphs with
some attempt to link
ideas. Some
paragraphs may be
fragmentary or overly
long.
Clear attempt at
structuring points.
The links between
paragraphs may be
unclear or illogical.
Paragraphs may be
fragmentary or
inconsistent in their
presentation of
ideas.
Limited attempt at
structuring points.
The response lacks a
delineated approach
to the material
presented.
No discernible
attempt to structure
points. The structure
may be convoluted,
epetitive and/or
incoherent.
Expression 20%
Clear, precise and
elegant writing style.
Very few (if any)
grammatical e
ors.
Clear and precise
writing style. Minimal
grammatical e
ors.
Clear writing style.
Some grammatical
e
ors may be
present.
Satisfactory writing
style. Poor
expression may
impact the clarity of
the ideas expressed.
Unsatisfactory
written expression.
Grammatical e
ors
esult in a lack of
clarity and
coherence.
Numerous
grammatical e
ors
and little to no
evidence of
proofreading.
References 10%
Follows required
eferencing style with
no e
ors.
Follows required
eferencing style with
minimal e
ors.
Follows required
eferencing style with
some e
ors.
Follows required
eferencing style with
e
ors.
Follows inco
ect
eferencing style or
significant e
ors. No referencing used.
Answered Same Day Oct 24, 2021

Solution

Taruna answered on Oct 25 2021
150 Votes
Introduction
    The analysis covers the principles of the CIA that help to provide uninte
upted and reliable access to information services. The CIA is one of the independent organizations responsible for supplying US policy makers with national security intelligence. The appointments are ca
ied out with the advice and consent of the Senate, where the operations, budget and staff are handled. Thus, the structural understanding of CIA is more like an agency that has full control of the government and it is subjected to offer services at their command and disposal (Galanc et al, 2016).
The CIA is using the US government's main foreign intelligence to handle the FBI's counterintelligence activities. In modern context, the challenges of CIA to function as the investigation agency have been expanded; the roles and responsibilities have dramatically evolved over the past two decades due to the rise of technology and the process through which, various threats keep on surging out of nowhere in United States. A major section of CIA now remains involved in seeking information, collection of evidences as well as to work as the collation agency with the other entities like DHS and FBI. The process of the information resource management ensures that the roles and responsibilities of CIA are going to expand as per the consistent evolution of technology.
The Conceptual Understanding of CIA
    At first, it is significant to note here that the structural understanding of CIA leads to the points that it is exclusively made by keeping in mind the aspects of confidentiality, integrity and availability of services to the nation (Agrell, 2002). This three folded structure of the agency can be interpreted by taking confidentiality on priority. Confidentiality drives the guarantee that only approved persons have access to the data and the information system. Some of the effective methods for confidentiality are the user ID and the password with access control lists or policy-based protection (Galanic et al, 2016).
This security level ensures that the preservation of all data stored in the agency servers as well as in the records of the investigating officers is well safe. Second, integrity is designed to ensure that data and knowledge can be trusted easily. It ensures that the editing is achieved by approving individuals and then managing the data encryption algorithms that are the main mechanism for the various standards of integrity. It is more like keeping the data accounts safe and secure as well as easy to understand. Finally, Availability highlights the information and information where data availability depends on hardware maintenance and software patching or network optimization updating that ensures accessibility (Walkowski, 2018).
Merits and Demerits of CIA
    The CIA’s Cybersecurity strengths include privacy safeguards where confidentiality is guaranteed to prevent any information that is sensitive from reaching the wrong people. It helps to access information that must be limited to those who are allowed to display the information in question. It is normal for data sectors to be classified according to the amount and form of damage that may fall under unintended hands. Steps must be taken to include strict categories in order to safeguard the confidentiality of the data, which requires special training for those who are privy to such documents (Peterson et al, 2016; Galnc et al, 2009; Agrell, 2002).
    It is implied from the above that the security and safeguarding process of CIA is crucial and precise in the sense that it takes up only those professionals who are dedicated to their work and have clear objectives about keeping the information resources secure. It is important to review this policy of CIA to recruit only the top professionals within the industry; there is a high level of security threats that the agency has to deal with in the modern context and it is necessary that the agency has the best skilled people to handle the security measures (Peterson et al, 2016; Galnc et al, 2009; Agrell, 2002). At the same time, it is important for the agency to ensure that the data processing s private and it is kept within the reach of the agency server only. It enhances the role of confidentiality as one of the major structural components of CIA.
    Moreover, what makes this confidentiality and prevention programs at CIA significant are the aspect of threat received by the information sources these days. Cybersecurity is one of the major issues that is seen of national interest especially for the government agencies like CIA, FBI or DHS. While making an investigation possible, a wide range of data has been collected and processed. This data is sensitive by nature because...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here